Question

1. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data,

its true or false questions
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1)

TRUE. Several acton or event based securit wall breakers are malware, spoofing, botnets, DoS (Denial of service) attack etc

2)

FALSE, because cyber crime could be done by just adding an additional program manuall to stole information which does not required any internet or any online service.

3)

TRUE, because there are several event or action based steps taken by the illigal hackers(RED HEAT HACKERS) over internt to modify, stole or to destroy the information. Appart from that infromation transmetted over internet can be lost due to hardware failure. Several other reasons are there.

4)

TRUE, several hardware security tools and software tools are there to protect the devices. Hardware tools to protect the hardware of data e.g. contineous took an eye on load over hardware and balance it. Software tools to protect the software part of device from any illigal or malicious activities e.g. anti virus softwares.

5)

TRUE. Botnets can be used to trigger Denial-of-Service (DDoS) attacks, send spam,steal data and allows the attacker to access devices in a network.

6)

TRUE

7)

TRUE, it can be formed between any two serviceds or devices and can control one(device or service) not to serve other(device or service).

8)

TRUE, Backdoor is a type of malware.

9)

TRUE. Spoofing is the process of disguising a communication from an unknown source as being from a known or trusted source.

10)

TRUE. You can implement firewall either as hardware or as a software to protect the network and its resources.

11)

TRUE

12)

FALSE, Access controls regulates who or what can vew or use the resources in a computer environment.

Add a comment
Know the answer?
Add Answer to:
its true or false questions 1. A computer security risk is any event or action that...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • Group B Word Pool IL. A computer application that allows the user to enter demographic information,...

    Group B Word Pool IL. A computer application that allows the user to enter demographic information, schedule appointments, maintain lists of computer network data server local area network dumb terminal. insurance payers, perform billing tasks, and generate reports 12 Asystem that links personal computers and peripheral devices to share information and resources router practice management software redundancy Ethernet wide area network 13. Peripheral computer hardware that connects to the router to provide Internet access to the network or computer modem...

  • Information Security Exploits flaws in computer systems for nefarious reasons Represents people who use technology as...

    Information Security Exploits flaws in computer systems for nefarious reasons Represents people who use technology as a tool for anarchy Reflects lax attitudes and management failures Protects information and the systems that use, store and transmit it Results from power irregularities and ISP disruptions In an indirect attack approach The criminal breaks into a system using his or her own computer The nefarious message appears to be coming from a trusted source Data traveling over a network is monitored without...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • F 2. Data mining provides management with daily operational reports: True or False? 3. A Data...

    F 2. Data mining provides management with daily operational reports: True or False? 3. A Data Base Management System (DBMS) function is to-provide a company with F 1. A computer's Operating System (O/s) is always in volatile mode: True or access and control of its Operating System software 4. A computer's Operating System performs the Data Mining function: True or False? ru 5. Data travels via the Internet at 186,282 megabytes per second: Trus or False? 6. The World Wide...

  • TRUE OR FALSE QUESTIONS 1) In IS departments, the technology office investigates new information systems technologies...

    TRUE OR FALSE QUESTIONS 1) In IS departments, the technology office investigates new information systems technologies and determines how the organization can benefit from them. 2) The chief technology officer evaluates new technologies and identifies those that are most relevant to the organization. 3) In an IS department, the development group manages the computing infrastructure, including individual computers, networks, and communications media. 4) If an organization does not develop programs in-house, then the development group of the IS department will...

  • 1)The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of...

    1)The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security. Select one: True False 2)Which term below is frequently used to describe the tasks of securing information that is in a digital format? Select one: a. network security b. information security c. logical security d. physical security 3) The ____ Act requires banks and financial institutions to alert customers of...

  • Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as...

    Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as files and hardware. 2. A(n). is a logical grouping of users and equipment as defined by the network administrator. 3. Microsoft server editions have interfaces similar to the current was new for Windows Server 2008 and Windows 7 and is designed to improve network performance by storing information downloaded from the Internet or a web server onto a local area network client. 5. An...

  • Check Your Understanding 13.1 Instructions: Indicate whether the following statements are true or false (Tor F....

    Check Your Understanding 13.1 Instructions: Indicate whether the following statements are true or false (Tor F. 1. Hacking is more prevalent in healthcare because of the value of patient information on the black market. 2. Internal security breaches are far more common than external breaches 3. The Identity Theft and Assumption Deterrence Act of 1998 makes it a federal crime to commit an act of identity 4. Vulnerabilities and threats are terms that can be used interchangeably. 5. Healthcare organizations...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT